Skip to content

Commit

Permalink
📝 Orange Cloud is now encrypted (#2270)
Browse files Browse the repository at this point in the history
* 📝 Orange Cloud is now encrypted

* 🐛 Fix region
  • Loading branch information
CollierCZ authored Apr 7, 2022
1 parent 1a1adbd commit 29ea11b
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 3 deletions.
6 changes: 4 additions & 2 deletions docs/src/security/data-deletion.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,14 @@ title: "Data deletion"
weight: 6

description: |
Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider will perform a wipe on the data utilizing either [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final) or [DoD 5220.22-M](http://www.dss.mil/documents/odaa/nispom2006-5220.pdf) depending upon the offering. This wipe is done immediately before reuse.
Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider performs a wipe on the data utilizing [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final). This wipe is done immediately before reuse.
---

{{< description >}}

All projects, except those hosted on OVH or Orange Cloud for Business, utilize encrypted volumes. The encryption key is destroyed when we release the volume back to the provider, adding another layer of protection.
All projects, except those hosted on OVH, utilize encrypted volumes.
The encryption key is destroyed when the volume is released back to the provider,
which adds another layer of protection.

## Media destruction

Expand Down
2 changes: 1 addition & 1 deletion docs/src/security/encryption.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,6 @@ Data in transit on Platform.sh controlled networks (for example, between the app

## Data at rest

All application data is encrypted at rest by default using encrypted ephemeral storage (typically using an AES-256 block cipher). Some Enterprise-Dedicated clusters and the `FR-1` and `FR-3` regions do not have full encryption at rest.
All application data is encrypted at rest by default using encrypted ephemeral storage (typically using an AES-256 block cipher). Some Enterprise-Dedicated clusters and the `FR-3` region do not have full encryption at rest.

If you have specific audit requirements surrounding data at rest encryption, please [contact support](/overview/get-support.md).

0 comments on commit 29ea11b

Please sign in to comment.